SlideShare une entreprise Scribd logo
1  sur  11
Page § 1Confidential
YOUR LOGO
Security	&	Privacy	Challenges	Faced	By	
Financial	Services	Firms	In	The	Digital	Age
Kalpesh	Desai
CEO
Agile	Financial	Technologies
info@agile-ft.com
Page § 2Confidential
The “Millenials” have changed all the questions
§ The success of your digital strategy will depend on millenials
warming up to the same
§ Millenials only wish to interface digitally
§ Financial services firms are being forced to focus on user
experience and turn their IT systems around
§ Traditional systems were designed for workflow, assuming that
customers were willing to wait for a response
§ The digital customer
wants information
and service
on-demand
(mobile devices and
the web)
Page § 3Confidential
Digital Technology Has Changed
The Way We Do Business
Financial firms desire to create "insight
based" customer experiences
Need to leverage "The digital channel”
Need to evolve the role of agents in the
digital age
Work with Aggregators and Disrupters (P2P)
Identify and work directly with Ecosystems
Embrace "Internet of Things" into their
business model
Page § 4Confidential
Digital Technology Disruption
Across Financial Services
Page § 5Confidential
Bottlenecks
§ Technology deficit is glaring as financial firms rush to jump onto the
bandwagon without thinking through security and privacy
challenges
§ Big data required for insight based customer experiences, provides
big security and privacy challenges
§ Regulators are also evolving and as business models go cross-
border across ecosystems, there may be one or more regulator
involved. FinTech companies need a full time compliance officer!
Page § 6Confidential
Risks, Threats & Challenges
§ Privacy & Customer Information Ownership
- Financial services sector maintains sensitive information about individuals and
enterprises
- As penetration of online and mobile services increase, more data is available in
digital format – easier to analyze but susceptible to security breaches
- This data eventually is ubiquitous
- Interaction with ecosystems and aggregators crosses regulatory boundaries and
a very, very thin line in terms of how sensitive personal, financial and health
information would be provided to third parties in a secure manner.
- When data is shared, data ownership must be firmly established because this
can violate your consent agreements with customers
- Data labeling, selective data sharing and identity/privacy-aware data sharing will
become the need of the hour.
- Privacy aware data sharing is complex and requires rework and tagging on
already voluminous data
Page § 7Confidential
Risks, Threats & Challenges
§ Digital Identity Theft
- Major challenge as integrated, omnichannel experiences are being demanded by
customers
- To extend fintech services in a seamless fashion, reliance on conventional
authentication mechanisms such as passwords and PINs have reduced, leading
way to:
- Devices (mobile phones) equipped with biometric sensors
- OTP (one time passwords)
- Code generating apps (Google Authenticator)
- Potential to clone these identities lead to amplified risks
- Adaptive authentication or risk-based authentication potentially analyzes user
behavior. Granting access on this basis could lead to misuse of digital identities
- API’s and interfacing systems communicate with multiple enterprise apps and
allow seamless sharing of data. Opens up threats to cross-platform malware
- There is a serious technology and security architecture deficit amongst most
financial institutions that could enable them fight the threat
- FinTech startups, though innovative, are just as good as their software coding
practices
Page § 8Confidential
Risks, Threats & Challenges
§ Risk of regulatory non-compliance
- Compliance with KYC, anti-money laundering norms and regulatory enforced
blacklists
- Ability to report suspicious activity across ubiquitous systems
- Compliance with data protection laws
§ Regulators take privacy policies very seriously
- Thin line between trying to gain customer insight and infringing on privacy
- In some cases, completely against regulation
- Online payment processing company, Dwolla, was fined USD 100K for purporting that
its transactions were “safe” and “secure,” that its information was “securely encrypted,”
and that it was compliant with up-to-date data security standards. They were
investigated by Consumer Financial Protection Bureau (CFPB) and taken to task in
March 2016
§ Risk of cyber-attacks
- “There are only two types of companies: those that are already hacked and
those that will be” ~ Robert Mueller, FBI Director
Page § 9Confidential
Key Considerations
§ In the absence of a single regulator and the ubiquitous nature of
FinTech services, ignorance of statutory & regulatory laws is
inexcusable.
§ Control access to data with systems, policies and procedures
§ Implement audit and forensic capabilities to comply with regulatory,
statutory or law enforcement audit requirements
§ Dispose of data you no longer need – reduce potential liabilities in
the event of a security breach
§ Treat customers and consumers consistently with promises (Online
Privacy Policy) and in line with regulatory norms
Page § 10Confidential
Key Considerations
§ Proactively disclose breaches
§ Focus on risk assessment and adopting security controls
§ Implement strict policies on allowing confidential data to be stored
outside your firewall
§ Take steps to reduce threats against targeted eavesdropping, man-
in-the-middle attacks, cross-platform malware
§ Be cautious about the public cloud, a favorite target of data thieves.
Page § 11Confidential
For more information, write to: info@agile-ft.com
Visit us on: www.agile-ft.com
U.S.A.	Ÿ Mauritius	Ÿ U.A.E.	Ÿ India	Ÿ Singapore

Contenu connexe

Tendances

Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Mohd Faiz
 
Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...
Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...
Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...cjwells
 
Blockchain applications in payments and fintech
Blockchain applications in payments and fintechBlockchain applications in payments and fintech
Blockchain applications in payments and fintechPenser
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondMichael Novak
 
Crypto currency
Crypto currencyCrypto currency
Crypto currencyHemon Dey
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainBlockchain Council
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain SecurityITU
 
The Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking SectorThe Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking SectorPECB
 
apidays LIVE LONDON - How APIs are changing the fintech world by Chirine Ben...
apidays LIVE LONDON - How APIs are changing the fintech world  by Chirine Ben...apidays LIVE LONDON - How APIs are changing the fintech world  by Chirine Ben...
apidays LIVE LONDON - How APIs are changing the fintech world by Chirine Ben...apidays
 
Fundamental Analysis for Crypto Assets
Fundamental Analysis for Crypto AssetsFundamental Analysis for Crypto Assets
Fundamental Analysis for Crypto AssetsJesus Rodriguez
 
Cryptocurrencies and the Blockchain
Cryptocurrencies and the BlockchainCryptocurrencies and the Blockchain
Cryptocurrencies and the BlockchainMatt Thompson
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsSaad Zaher
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainMalak Abu Hammad
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Edureka!
 

Tendances (20)

Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.
 
Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...
Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...
Digital Currency Systems: Emerging B2B e-Commerce Alternative During Monetary...
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Blockchain applications in payments and fintech
Blockchain applications in payments and fintechBlockchain applications in payments and fintech
Blockchain applications in payments and fintech
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 
Crypto currency
Crypto currencyCrypto currency
Crypto currency
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchain
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
The Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking SectorThe Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking Sector
 
STOCK MARKET PREDICTION
STOCK MARKET PREDICTIONSTOCK MARKET PREDICTION
STOCK MARKET PREDICTION
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain on AWS
Blockchain on AWSBlockchain on AWS
Blockchain on AWS
 
apidays LIVE LONDON - How APIs are changing the fintech world by Chirine Ben...
apidays LIVE LONDON - How APIs are changing the fintech world  by Chirine Ben...apidays LIVE LONDON - How APIs are changing the fintech world  by Chirine Ben...
apidays LIVE LONDON - How APIs are changing the fintech world by Chirine Ben...
 
Fundamental Analysis for Crypto Assets
Fundamental Analysis for Crypto AssetsFundamental Analysis for Crypto Assets
Fundamental Analysis for Crypto Assets
 
E banking security
E banking securityE banking security
E banking security
 
Bitcoin technology
Bitcoin technologyBitcoin technology
Bitcoin technology
 
Cryptocurrencies and the Blockchain
Cryptocurrencies and the BlockchainCryptocurrencies and the Blockchain
Cryptocurrencies and the Blockchain
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
 

En vedette

Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Ulf Mattsson
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital FirmsPulkit Sharma
 
21 Ideas For Nail Art Designs
21 Ideas For Nail Art Designs21 Ideas For Nail Art Designs
21 Ideas For Nail Art Designscookdress
 
презентация Microsoft power point (3)
презентация Microsoft power point (3)презентация Microsoft power point (3)
презентация Microsoft power point (3)Bugaydima
 
Що_потрібно_при_укладенні_заповіту
Що_потрібно_при_укладенні_заповітуЩо_потрібно_при_укладенні_заповіту
Що_потрібно_при_укладенні_заповітуVitalij Misjats
 
Attract Great Talent – How to tell an authentic story about life at your com...
Attract Great Talent –  How to tell an authentic story about life at your com...Attract Great Talent –  How to tell an authentic story about life at your com...
Attract Great Talent – How to tell an authentic story about life at your com...Rebecca Feldman
 
Facebook group admin and moderator, what do they do? (Infographic)
Facebook group admin and moderator, what do they do? (Infographic)Facebook group admin and moderator, what do they do? (Infographic)
Facebook group admin and moderator, what do they do? (Infographic)Stéphane Baudin
 
Sam Louwyck richt eindelijk firma op
Sam Louwyck richt eindelijk firma opSam Louwyck richt eindelijk firma op
Sam Louwyck richt eindelijk firma opThierry Debels
 
User experience design for indiatimes shopping
User experience design for indiatimes shoppingUser experience design for indiatimes shopping
User experience design for indiatimes shoppingGreenlemon
 
Live Webinar: Creating a Winning Content Strategy for Sponsored Content
Live Webinar: Creating a Winning Content Strategy for Sponsored ContentLive Webinar: Creating a Winning Content Strategy for Sponsored Content
Live Webinar: Creating a Winning Content Strategy for Sponsored ContentLinkedIn
 
FIE 2015 Judson Presentation Collofello Effect
FIE 2015 Judson Presentation Collofello EffectFIE 2015 Judson Presentation Collofello Effect
FIE 2015 Judson Presentation Collofello EffectBethany Smith
 
Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...
Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...
Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...Ogilvy
 
Guia de estudio Metolodologia de investigacion
Guia de estudio Metolodologia de investigacionGuia de estudio Metolodologia de investigacion
Guia de estudio Metolodologia de investigacionWilliam Matamoros
 

En vedette (20)

Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
 
Interview questions
Interview questionsInterview questions
Interview questions
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
 
Dr Rajamani Resume-11162015
Dr Rajamani Resume-11162015Dr Rajamani Resume-11162015
Dr Rajamani Resume-11162015
 
21 Ideas For Nail Art Designs
21 Ideas For Nail Art Designs21 Ideas For Nail Art Designs
21 Ideas For Nail Art Designs
 
презентация Microsoft power point (3)
презентация Microsoft power point (3)презентация Microsoft power point (3)
презентация Microsoft power point (3)
 
Що_потрібно_при_укладенні_заповіту
Що_потрібно_при_укладенні_заповітуЩо_потрібно_при_укладенні_заповіту
Що_потрібно_при_укладенні_заповіту
 
Trazabilidad
TrazabilidadTrazabilidad
Trazabilidad
 
Interacciones
InteraccionesInteracciones
Interacciones
 
Res
ResRes
Res
 
Attract Great Talent – How to tell an authentic story about life at your com...
Attract Great Talent –  How to tell an authentic story about life at your com...Attract Great Talent –  How to tell an authentic story about life at your com...
Attract Great Talent – How to tell an authentic story about life at your com...
 
Facebook group admin and moderator, what do they do? (Infographic)
Facebook group admin and moderator, what do they do? (Infographic)Facebook group admin and moderator, what do they do? (Infographic)
Facebook group admin and moderator, what do they do? (Infographic)
 
Sam Louwyck richt eindelijk firma op
Sam Louwyck richt eindelijk firma opSam Louwyck richt eindelijk firma op
Sam Louwyck richt eindelijk firma op
 
User experience design for indiatimes shopping
User experience design for indiatimes shoppingUser experience design for indiatimes shopping
User experience design for indiatimes shopping
 
Live Webinar: Creating a Winning Content Strategy for Sponsored Content
Live Webinar: Creating a Winning Content Strategy for Sponsored ContentLive Webinar: Creating a Winning Content Strategy for Sponsored Content
Live Webinar: Creating a Winning Content Strategy for Sponsored Content
 
The Good, Bad & Ugly of Freelancing 2016
The Good, Bad & Ugly of Freelancing 2016The Good, Bad & Ugly of Freelancing 2016
The Good, Bad & Ugly of Freelancing 2016
 
FIE 2015 Judson Presentation Collofello Effect
FIE 2015 Judson Presentation Collofello EffectFIE 2015 Judson Presentation Collofello Effect
FIE 2015 Judson Presentation Collofello Effect
 
Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...
Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...
Neil deGrasse Tyson is about to crack “a knowledge egg on your ass” #CannesLi...
 
Guia de estudio Metolodologia de investigacion
Guia de estudio Metolodologia de investigacionGuia de estudio Metolodologia de investigacion
Guia de estudio Metolodologia de investigacion
 

Similaire à Privacy & Security Challenges Faced By Financial Services In The Digital Age

Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked EconomySonia Kaul Takoo
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web SiteDonny Shimamoto
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersBroadridge
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Digital Transformation of U.S. Private Banking
Digital Transformation of U.S. Private BankingDigital Transformation of U.S. Private Banking
Digital Transformation of U.S. Private BankingCognizant
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity managementshivan82
 
Cards and Payments Asia - Apr. 2016
Cards and Payments Asia - Apr. 2016Cards and Payments Asia - Apr. 2016
Cards and Payments Asia - Apr. 2016Wing Yuen Loon
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointDr Rachel O'Connell
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...accenture
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 

Similaire à Privacy & Security Challenges Faced By Financial Services In The Digital Age (20)

Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Securter Systems
Securter Systems Securter Systems
Securter Systems
 
Aggregation Platforms-White Paper
Aggregation Platforms-White PaperAggregation Platforms-White Paper
Aggregation Platforms-White Paper
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Digital Transformation of U.S. Private Banking
Digital Transformation of U.S. Private BankingDigital Transformation of U.S. Private Banking
Digital Transformation of U.S. Private Banking
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
Cards and Payments Asia - Apr. 2016
Cards and Payments Asia - Apr. 2016Cards and Payments Asia - Apr. 2016
Cards and Payments Asia - Apr. 2016
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 

Plus de Agile Financial Technologies

Plus de Agile Financial Technologies (13)

The Buying Game
The Buying GameThe Buying Game
The Buying Game
 
The Digital Insurer
The Digital InsurerThe Digital Insurer
The Digital Insurer
 
Agile Financial Times - September 2014
Agile Financial Times - September 2014Agile Financial Times - September 2014
Agile Financial Times - September 2014
 
Agilis Insurance Mobility Suite
Agilis Insurance Mobility SuiteAgilis Insurance Mobility Suite
Agilis Insurance Mobility Suite
 
Insurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsInsurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market Segments
 
Interview in The Policy Magazine, The UAE Insurance Report 2012
Interview in The Policy Magazine, The UAE Insurance Report 2012Interview in The Policy Magazine, The UAE Insurance Report 2012
Interview in The Policy Magazine, The UAE Insurance Report 2012
 
Insurance Technology Trends
Insurance Technology TrendsInsurance Technology Trends
Insurance Technology Trends
 
Buy-outs - India Inc finds diamonds in the dust
Buy-outs - India Inc finds diamonds in the dustBuy-outs - India Inc finds diamonds in the dust
Buy-outs - India Inc finds diamonds in the dust
 
Agile Financial Times Apr09
Agile Financial Times Apr09Agile Financial Times Apr09
Agile Financial Times Apr09
 
Agile Financial Times May09 Edition
Agile Financial Times May09 EditionAgile Financial Times May09 Edition
Agile Financial Times May09 Edition
 
Making BancAssurance Agile - 4th Annual BancAssurance Conference
Making BancAssurance Agile - 4th Annual BancAssurance ConferenceMaking BancAssurance Agile - 4th Annual BancAssurance Conference
Making BancAssurance Agile - 4th Annual BancAssurance Conference
 
Technology Innovation For Banks In The "New Hard Times"
Technology Innovation For Banks In The "New Hard Times"Technology Innovation For Banks In The "New Hard Times"
Technology Innovation For Banks In The "New Hard Times"
 
Private Banking & Wealth Management - What Clients Want
Private Banking & Wealth Management - What Clients WantPrivate Banking & Wealth Management - What Clients Want
Private Banking & Wealth Management - What Clients Want
 

Dernier

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Privacy & Security Challenges Faced By Financial Services In The Digital Age

  • 1. Page § 1Confidential YOUR LOGO Security & Privacy Challenges Faced By Financial Services Firms In The Digital Age Kalpesh Desai CEO Agile Financial Technologies info@agile-ft.com
  • 2. Page § 2Confidential The “Millenials” have changed all the questions § The success of your digital strategy will depend on millenials warming up to the same § Millenials only wish to interface digitally § Financial services firms are being forced to focus on user experience and turn their IT systems around § Traditional systems were designed for workflow, assuming that customers were willing to wait for a response § The digital customer wants information and service on-demand (mobile devices and the web)
  • 3. Page § 3Confidential Digital Technology Has Changed The Way We Do Business Financial firms desire to create "insight based" customer experiences Need to leverage "The digital channel” Need to evolve the role of agents in the digital age Work with Aggregators and Disrupters (P2P) Identify and work directly with Ecosystems Embrace "Internet of Things" into their business model
  • 4. Page § 4Confidential Digital Technology Disruption Across Financial Services
  • 5. Page § 5Confidential Bottlenecks § Technology deficit is glaring as financial firms rush to jump onto the bandwagon without thinking through security and privacy challenges § Big data required for insight based customer experiences, provides big security and privacy challenges § Regulators are also evolving and as business models go cross- border across ecosystems, there may be one or more regulator involved. FinTech companies need a full time compliance officer!
  • 6. Page § 6Confidential Risks, Threats & Challenges § Privacy & Customer Information Ownership - Financial services sector maintains sensitive information about individuals and enterprises - As penetration of online and mobile services increase, more data is available in digital format – easier to analyze but susceptible to security breaches - This data eventually is ubiquitous - Interaction with ecosystems and aggregators crosses regulatory boundaries and a very, very thin line in terms of how sensitive personal, financial and health information would be provided to third parties in a secure manner. - When data is shared, data ownership must be firmly established because this can violate your consent agreements with customers - Data labeling, selective data sharing and identity/privacy-aware data sharing will become the need of the hour. - Privacy aware data sharing is complex and requires rework and tagging on already voluminous data
  • 7. Page § 7Confidential Risks, Threats & Challenges § Digital Identity Theft - Major challenge as integrated, omnichannel experiences are being demanded by customers - To extend fintech services in a seamless fashion, reliance on conventional authentication mechanisms such as passwords and PINs have reduced, leading way to: - Devices (mobile phones) equipped with biometric sensors - OTP (one time passwords) - Code generating apps (Google Authenticator) - Potential to clone these identities lead to amplified risks - Adaptive authentication or risk-based authentication potentially analyzes user behavior. Granting access on this basis could lead to misuse of digital identities - API’s and interfacing systems communicate with multiple enterprise apps and allow seamless sharing of data. Opens up threats to cross-platform malware - There is a serious technology and security architecture deficit amongst most financial institutions that could enable them fight the threat - FinTech startups, though innovative, are just as good as their software coding practices
  • 8. Page § 8Confidential Risks, Threats & Challenges § Risk of regulatory non-compliance - Compliance with KYC, anti-money laundering norms and regulatory enforced blacklists - Ability to report suspicious activity across ubiquitous systems - Compliance with data protection laws § Regulators take privacy policies very seriously - Thin line between trying to gain customer insight and infringing on privacy - In some cases, completely against regulation - Online payment processing company, Dwolla, was fined USD 100K for purporting that its transactions were “safe” and “secure,” that its information was “securely encrypted,” and that it was compliant with up-to-date data security standards. They were investigated by Consumer Financial Protection Bureau (CFPB) and taken to task in March 2016 § Risk of cyber-attacks - “There are only two types of companies: those that are already hacked and those that will be” ~ Robert Mueller, FBI Director
  • 9. Page § 9Confidential Key Considerations § In the absence of a single regulator and the ubiquitous nature of FinTech services, ignorance of statutory & regulatory laws is inexcusable. § Control access to data with systems, policies and procedures § Implement audit and forensic capabilities to comply with regulatory, statutory or law enforcement audit requirements § Dispose of data you no longer need – reduce potential liabilities in the event of a security breach § Treat customers and consumers consistently with promises (Online Privacy Policy) and in line with regulatory norms
  • 10. Page § 10Confidential Key Considerations § Proactively disclose breaches § Focus on risk assessment and adopting security controls § Implement strict policies on allowing confidential data to be stored outside your firewall § Take steps to reduce threats against targeted eavesdropping, man- in-the-middle attacks, cross-platform malware § Be cautious about the public cloud, a favorite target of data thieves.
  • 11. Page § 11Confidential For more information, write to: info@agile-ft.com Visit us on: www.agile-ft.com U.S.A. Ÿ Mauritius Ÿ U.A.E. Ÿ India Ÿ Singapore